Papers by Keyword: Lattice

Paper TitlePage

Authors: Feng Man Miao, Qiu Yu Zhang, Zhan Ting Yuan
Abstract: A bran-new lattice based cross-domain model is proposed to solve the shortcomings of the existing authentication model. Firstly, using the lattice theory, this model builds credit-domain alliance and user alliance on the two dimensional coordinates to avoid the abuse of centralized plans. Secondly, it uses the superiority thought of the existing authentication system to strengthen the integrity of the model. Finally, the detailed work flow, formula, domain disposal, extended algorithm, and identity-based Stealth transport protocols of the new model are drafted. It ensures the user’s identity information and privacy. After the certification and analysis, this model proved to have a good Practical character and an extremely large extension space.
Authors: Yue Zhai, An Sheng Deng
Abstract: Frequent closed itemsets play an important role in pruning redundant rules fast. A lot of algorithms for mining FCI by vertical data formats have been developed. Previous methods often consume more memory for storage Bit-Vectors and the time for computing the intersection among Bit-Vectors. In this paper, it uses Dynamic Binary Group for compress the database and generates DBG-lattice for mining FCI. Advantages of this method are fast computing the support and the intersection of two DBGs. Experimental results show the efficient of this method in both the mining time and memory usage.
Authors: Guo Tao Zhang, Zhi Yuan Rui, Rui Cheng Feng, Chang Feng Yan
Abstract: The motion of interstitial atoms (one of the point defects) in material is random under certain temperature. However, the diffusion of interstitial atoms has priority along some certain directions to the others, so it is necessary to reveal the phenomenon (the phenomenon also can be called anisotropic). In order to illustrate the anisotropic and reveal the magnitude of probability of the micro crack formation along crystal axes, some formulae derived from former literatures have been adopted, and the values of diffusion probability and diffusivity of interstitial atoms-Ti or Al along 〈110〉and〈100〉have been calculated. The conclusion that the diffusion of interstitial atoms along different crystal axis has different diffusivity is verified by the comparison of the results of calculations.
Authors: Yue Zhai, Xi Yu, An Sheng Deng
Abstract: In the problem of mining classification rules, previous methods are too general or too over-fitting for a given dataset. In this paper, through analyzing the characteristics of concept lattice and indiscernible matrix, classification rule acquisition based on lattice was proposed. Our method includes two phase: (1) proposing incremental generating the nodes of lattice using indiscernible matrix. (2) Developing some theorems for pruning redundant rules quickly. It is shown by experimental results that our approach not only results in shorter execution times, but also avoids missing important rules than the generalization of previous known methods.
Authors: R. Gabbrielli, I.G. Turner, Chris R. Bowen
Abstract: The demand in the medical industry for load bearing materials is ever increasing. The techniques currently used for the manufacture of such materials are not optimized in terms of porosity and mechanical strength. This study adopts a microstructural shape design approach to the production of open porous materials, which utilizes spatial periodicity as a simple way to generate the models. A set of triply periodic surfaces expressed via trigonometric functions in the implicit form are presented. A geometric description of the topology of the microstructure is necessary when macroscopic properties such as mechanical strength, stiffness and isotropy are required to be optimised for a given value of volume fraction. A distinction between the families of structures produced is made on the basis of topology. The models generated have been used successfully to manufacture both a range of structures with different volume fractions of pores and samples of functional gradient material using rapid prototyping.
Authors: Zhong Ming Hou, Ling Duan, Kai Yao, Xiao Wen Zhao
Abstract: For the problems such as layering and splitting of traditional sandwich structure composite, a resin matrix composite with lattice and interface reinforced structure has been designed, and using vacuum forming process was developed in this paper. The composite material has high specific strength and stiffness. On this basis, a road pavement developed by this composite material used in engineer urgent was designed. This composite pavement with characters of light weight, high strength and good toughness, and its surface plate was hard, wear-resistant and non-slip. The connection between the pavements was designed for quick assembling, which could make the pavement assemble operation was simple, fast and reliable.
Authors: Lei Zhang, Jing Xin Chang, Xue Zhi Xiang
Abstract: As kind of multiple results in speech recognition system, lattice and confusion network are widely applied in spoken document classification and spoken document retrieval. In this paper, the relation between lattice and confusion network is analyzed firstly. Then based on the confusion network by clustering algorithm, different evaluation approaches are applied here to test the performance of confusion network, which include accuracy, complexity and distortion of confusion network. For the experiments on speech recognition system, it can be drawn that compared with 1-best result, confusion network can have higher words accuracy.
Authors: Jun Ma, Zhi Ying Wang, Jiang Chun Ren, Jiang Jiang Wu, Yong Cheng, Song Zhu Mei
Abstract: The existence of trusted subjects is a major complication in implementing multilevel secure (MLS) systems. In MLS, trusted subjects are granted with privileges to perform operations possibly violating mandatory access control policies. It is difficult to prevent them from data leakage with out too strict confinement. This paper reconsiders the privilege from the view of sensitive data and presents a dynamic trusted domain (DTD) mechanism for trusted subjects. In DTD, a domain is associated with a special label structure (LabelVector) distinguishing security policies and builds an isolated environment based on virtualization for a certain trusted subject. The channel for the trusted subject to communicate with outsider is controlled by a trusted request decision maker (TRDM). Only the request satisfies the rules on domain label and security levels can be passed through.
Authors: Jiří Kroc
Abstract: This paper try to elucidate some aspects of the impact of using two different types of computational lattices on the solution of simple models like, for example, grain boundary migration and/or dynamic recrystallization.Not surprisingly, the final solution is obviously affected by anisotropy of used lattices but as we know, they are computational lattices.Ho wever, a material itself has its own anisotropy of its lattice probably different from those lattices used in model.Therefore, the main task in nowadays simulations is to get rid of the influence of computational lattice and to achieve the properties of the lattice of the simulated material.
Authors: Quan Min Li, Chang Ying Xu, Hong Li Lv, Jun He
Abstract: According the radial flutter extension structure problems in commonly used fire alarm system, a novel topology structure of fire alarm systems based-on holographic crystal forms was proposed. It was composed of multiple devices, including intelligent fire detectors, which can communicate with each other, record fire information and judge, alarms, security, evacuation lights etc. Each device can record all of the information so as to form the hologram. These devices on each floor level in buildings and decorated with vertical layout in the staircase, so that fire alarm system topology based-on holographic crystal forms was set up. The systems can ensure the normal operation of other devices in case that central control equipment failed in extreme cases. And then the automatic fire safety equipment continued to automatically control fire rescue and guide the staff in the correct escape route. Moreover, when a device or a line goes wrong, only failure equipment or system was cut off line, and others were still able to keep communications. Compared with other methods, this new system does not affect the normal equipment of the work.
Showing 1 to 10 of 35 Paper Titles